Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
5.0 - 9.0 years
0 Lacs
chennai, tamil nadu
On-site
Join us for a role in "CCO Functions" at Barclays, where you'll spearhead the evolution of our digital landscape, driving innovation and excellence. You'll harness cutting-edge technology to revolutionize our digital offerings, ensuring unparalleled customer experiences. To be successful as a Tech Assurance AVP SOX, you should have experience with testing IT Application Controls (ITAC) / IT General Controls (ITGC) / Cyber Security Assessments and hands-on experience in IT Audits / IT Assessments and GRC (Governance, Risk & Controls), specifically SOx Review. It is essential to have a good understanding of industry frameworks such as COSO, COBIT, NIST, ISO27001, and control frameworks used in...
Posted 2 months ago
1.0 - 5.0 years
0 Lacs
chennai, tamil nadu
On-site
As an ITGC Systems Auditor at our company, your primary responsibility will be to conduct systems audits and IT security reviews, specifically focusing on IT General Control testing (ITGC) and security compliance under ISO 27001, SOC SSAE 18, and other related security standards, in alignment with company policies. You will also be involved in assessing automated process controls, particularly in ERPs such as Oracle, SAP, and Bahn. This is an individual contributor role that requires hands-on work, client interactions, and collaboration with various teams. You will be reporting directly to the Partner, Risk Assurance. To be considered for this role, you must be a CA & CISA qualified professi...
Posted 2 months ago
14.0 - 18.0 years
0 Lacs
hyderabad, telangana
On-site
You are an experienced IT-Security leader with 14-18 years of work experience, well-versed in IT Security, Team Management, and IT Security Policies. Colruyt Group is seeking a competent individual to fulfill the role of Team Manager, responsible for managing IT delivery, quality realization, and dependency across projects. You will work closely with the program core team to ensure the translation of program strategy into IT realization, estimates, planning, and tracking of the realization phase, and securing project resources by coordinating with resource pool managers/vendors. As a Team Manager, you will apply your significant knowledge of industry trends to improve team services, create a...
Posted 2 months ago
2.0 - 6.0 years
0 Lacs
pune, maharashtra
On-site
The IT Support Engineer role based in Pune involves a variety of responsibilities to ensure smooth functioning of IT systems. Your main tasks will include setting up new joiners on laptop/MacBook, installing and configuring computer hardware, software, networks, and printers. You will also be tasked with troubleshooting and diagnosing technical issues related to hardware, software, and networks. As an IT Support Engineer, you will provide technical assistance to end-users, both in person and remotely. Additionally, your role will require you to troubleshoot Microsoft products such as Outlook, Excel, Word, PowerPoint, OneNote, and OneDrive. You should also be familiar with providing end-user ...
Posted 2 months ago
12.0 - 14.0 years
22 - 25 Lacs
gurugram
Work from Office
Job Overview Drive the organization's security strategy and operations. Oversee cybersecurity initiatives, network security, license and AMC management. Ensure robust data protection through DLP and proxy and other security solutions. Combine technical expertise with leadership skills to safeguard digital assets and infrastructure. Develop and maintain a cybersecurity roadmap aligned with business objectives and evolving threats. Define, enforce, and regularly update security policies, standards, and procedures across IT domains. Lead evaluations and PoCs for emerging security tools and technologies, integrating them into infrastructure. Manage threat detection tools (SIEM, EDR, DLP) and ens...
Posted 2 months ago
5.0 - 8.0 years
5 - 9 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 months ago
3.0 - 6.0 years
5 - 9 Lacs
pune
Work from Office
Responsibilities: * Conduct vulnerability assessments & penetration tests * Manage cyber threats through risk analysis & mitigation strategies * Collaborate with IT teams on infrastructure security planning Health insurance Food allowance
Posted 2 months ago
3.0 - 5.0 years
6 - 10 Lacs
bengaluru
Work from Office
Description Create and implement security practices & tools within CI/CD pipelines where applicable to integrate security into the DevOps lifecycle. Identify, evaluate, and remediate security vulnerabilities in applications and infrastructure. Design, develop, & implement solutions to address infrastructure & security requirements. Develop, manage & integrate into CI/CD pipelines automated security testing processes. Oversee security incidents, including monitoring, analysis, and response. Align security practices with project goals in development, operations, & security teams. Set up and manage security monitoring tools and processes. Ensure team creates and maintains comprehensive document...
Posted 2 months ago
15.0 - 20.0 years
15 - 30 Lacs
mohali
Work from Office
Role & responsibilities:- We are searching for a seasoned and strategic IT leader to join our team as a Manager/Senior Manager, IT. In this role, you will be responsible for overseeing all aspects of IT Operations, Infra, Network, Helpdesk, and Compliance for our organization of approximately 900+ users. You will be a key member for the leadership team, providing expert guidance and ensuring the smooth operation and continuous improvement of our IT infrastructure. Develop and implement a comprehensive IT strategy aligned with the overall business goals and objectives. Manage and lead a high-performing IT team, including IT Operations, Network and Helpdesk. Oversee all IT operations, ensuring...
Posted 2 months ago
5.0 - 9.0 years
0 Lacs
nashik, maharashtra
On-site
You are an experienced IT professional responsible for overseeing and managing all IT infrastructure, systems, and software applications at Geo Lotus Global Pvt. Ltd. Your expertise in software integrations, network management, and IT security will be crucial in optimizing digital tools, protecting data, and enhancing IT operations to support organizational growth and efficiency. Your key responsibilities include monitoring and managing software utilization such as Tranzact ERP, Keka HRMS, Autobits machine monitoring, PipeTracker, QMS, CMMS, Google Workspace, and IT design architecture. You will ensure optimized software integrations for seamless inter-departmental workflows and data consist...
Posted 2 months ago
3.0 - 7.0 years
0 Lacs
kanpur, uttar pradesh
On-site
You will be joining IIT Kanpur Development Foundation (IITK DF) as an Officer in IT Infrastructure & Automation, based in Kanpur. Reporting to the Senior Manager- IT Infrastructure & Automation, you will be an essential part of the IT Team, contributing towards enhancing the organization's IT infrastructure, vendor management, automation of processes, and ensuring efficient system operations. Your primary responsibilities will include developing and implementing Standard Operating Procedures (SOPs) for IT processes, security, and compliance, managing vendor relationships, negotiating contracts, aligning IT services with organizational needs, and budget constraints. You will also support the ...
Posted 2 months ago
5.0 - 9.0 years
0 - 0 Lacs
karnataka
On-site
As a Principal Specialist in Information Security at our collaborative organization, your main responsibilities will include representing the security office within the RnD organization. You will work closely with development and architect teams to propose solutions aligned with Amadeus standards. It will be crucial to communicate with BISO/TISO to present solutions, maintain the risk register, and develop mitigation plans. Additionally, you will coordinate the elaboration, update, publishing, and promotion of the Internal IT security architecture and its strategy. Providing consultancy, guidance, and support in Internal IT security architecture to other departments is also a key aspect of t...
Posted 2 months ago
5.0 - 9.0 years
0 Lacs
pune, maharashtra
On-site
As the IT Security Architect at our organization, you will play a critical role in designing and implementing robust technical security measures across our IT infrastructure and applications. Your deep technical expertise will be essential in ensuring compliance and effective risk management aligned with organizational goals. Responsibilities include defining and maintaining security architecture in line with our IT infrastructure, implementing technical controls for access management and authentication following ISO standards, designing data protection protocols for securing sensitive information through encryption and masking, overseeing secure development and lifecycle of software project...
Posted 2 months ago
4.0 - 7.0 years
15 - 20 Lacs
thane
Work from Office
Role & responsibilities Application and API Security: Perform reviews and assessments of application and API-level security controls to identify and mitigate vulnerabilities in internal and partner applications. Vulnerability Assessment and Penetration Testing (VAPT): Conduct scheduled scans using tools such as Qualys, Tenable, Burp Suite, and Metasploit. Prepare reports, track remediation efforts, and ensure timely closure of identified vulnerabilities. Change Advisory Board (CAB): Participate in CAB meetings to review proposed IT changes and provide security-related approvals to ensure compliance with security policies and to avoid introduction of risks. Brand Risk Monitoring: Monitor bran...
Posted 2 months ago
2.0 - 4.0 years
6 - 8 Lacs
jaipur
Work from Office
3-4 years relevant experience in working on infrastructure operations Experience in managing multiple Active Directories, WSUS, WorkspaceOne, Server, Anti-Virus Servers, MDT servers Should be Active working knowledge of Windows, networking, storage, firewalls, security practices Must be experienced with PC, Email Exchange, IT Operations & Security, including Service Desk Good to have Provide network access to all staff and students Must have Excellent knowledge in MS Products, MS Excel, Word, Power Point, Outlook, Visio, Project, Office 365 Contact Person : Kathiravan G
Posted 2 months ago
3.0 - 5.0 years
7 - 11 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 months ago
3.0 - 5.0 years
7 - 11 Lacs
hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 months ago
3.0 - 5.0 years
5 - 7 Lacs
gurugram
Work from Office
Maintain a safe and secure environment for clients and employees. Monitor premises via patrols, CCTV surveillance, and control access points. Prevent unauthorized access, theft, vandalism, and other illegal activities. Respond promptly to alarms, incidents, and emergencies. Prepare and submit incident reports and daily activity logs. Assist visitors, verify identification, and maintain visitor logs. Ensure compliance with company policies, SOPs, and safety protocols. Coordinate with police, fire departments, and emergency medical personnel when required. Eligibility Criteria: Minimum Graduate (any discipline) Minimum 3 years of experience in IT security or related roles. Age: 21 40 years. Ph...
Posted 2 months ago
4.0 - 8.0 years
6 - 10 Lacs
bengaluru
Work from Office
Experience in Internal Control, General Computer and Application Control Audit background. Knowledge and experience in various Information security standards / regulations / best practices (ISO-27001, COBIT, PCI-DSS, GDPR, HIPAA, SOC2, etc. Knowledge of efficient way to protect the system, networks, software, data and information systems against security threats. Experience collaborating with a team of security experts in a diverse set of security topics including, but not limited to, security architecture, financial controls and regulatory compliance, identity and access management, data loss prevention and privacy Required education Bachelor's Degree Preferred education Master's Degree Req...
Posted 2 months ago
8.0 - 10.0 years
12 - 17 Lacs
pune
Work from Office
Were looking for a Security Engineer to: Implement and manage IT security controls across applications and systems. Oversee operational management and ownership of IT security areas. Contribute to the development and refinement of security policies. Provide technical expertise to support project objectives. Collaborate with project teams to design, develop, test, and deploy secure software solutions. Troubleshoot and debug security-related issues. Participate in Agile ceremonies and relevant technical communities. Essential: Cloud security, specifically Azure Experience with AKS (Azure Kubernetes Service) Containerization technologies (e.g., Docker, Kubernetes) Monitoring systems (e.g., Prom...
Posted 2 months ago
4.0 - 7.0 years
11 - 16 Lacs
hyderabad
Work from Office
Gaian Group is looking for IT Manager to join our dynamic team and embark on a rewarding career journey Developing and implementing the IT department's strategy and goals Managing the IT department's budget and resources Ensuring that the organization's technology infrastructure is reliable, secure, and scalable Overseeing the development, implementation, and maintenance of software applications, hardware, and network systems Ensuring compliance with IT security and compliance standards Managing vendor relationships and service level agreements Providing technical support to end-users Managing IT staff, including hiring, training, and performance evaluations Collaborating with other departme...
Posted 2 months ago
5.0 - 8.0 years
5 - 9 Lacs
hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 months ago
5.0 - 8.0 years
5 - 9 Lacs
noida
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 months ago
8.0 - 13.0 years
8 - 12 Lacs
pune
Work from Office
Overall 8 years of industry experience adn min 4 yrs as a Network Security engineering on Design, Implementation and troubleshooting Firewall, VPNs, Cloud environement Security. L3 Engineer should be able to handle and experience in Palo Alto, Fortigate Nex-Gen Firewall, Azure , AWS & OCI environment. Min exp in AWS, Azure 4 yrs. Experience in troubleshooting and problem solving a wide variety of client IT security related issues (Palo Alto/Checkpoint/Fortinet/Azure & AWS firewalls, IDS/IPS, VPN). Global protect VPN and PAloAlto Agent deployment and uptime. Direct and knowledge transfer to L2 engineer for upcoming deployments, Rule implementtation, Modification and Service Request fulfillmen...
Posted 2 months ago
3.0 - 5.0 years
7 - 11 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 months ago
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
126846 Jobs | Dublin
Wipro
40828 Jobs | Bengaluru
EY
33625 Jobs | London
Accenture in India
30804 Jobs | Dublin 2
Uplers
24658 Jobs | Ahmedabad
Turing
23117 Jobs | San Francisco
IBM
20385 Jobs | Armonk
Infosys
19479 Jobs | Bangalore,Karnataka
Accenture services Pvt Ltd
19425 Jobs |
Capgemini
19370 Jobs | Paris,France